Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.217.217.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61367
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.217.217.111.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 09:10:48 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 111.217.217.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 111.217.217.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
110.78.149.229 attackspambots
unauthorized connection attempt
2020-02-16 19:55:33
122.117.193.70 attackbotsspam
unauthorized connection attempt
2020-02-16 19:13:23
179.186.230.106 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 19:24:50
206.51.121.36 attackbotsspam
unauthorized connection attempt
2020-02-16 19:48:15
203.218.155.21 attackbots
unauthorized connection attempt
2020-02-16 19:32:03
85.132.110.163 attack
unauthorized connection attempt
2020-02-16 19:10:01
116.102.205.237 attackspam
unauthorized connection attempt
2020-02-16 19:54:12
178.17.99.23 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 19:34:26
111.240.127.231 attackbotsspam
unauthorized connection attempt
2020-02-16 19:55:05
143.255.242.181 attack
unauthorized connection attempt
2020-02-16 19:07:18
45.148.10.92 attackspam
Lines containing failures of 45.148.10.92
auth.log:Feb 15 04:18:50 omfg sshd[21945]: Connection from 45.148.10.92 port 39658 on 78.46.60.16 port 22
auth.log:Feb 15 04:18:50 omfg sshd[21945]: Did not receive identification string from 45.148.10.92
auth.log:Feb 15 04:18:59 omfg sshd[21946]: Connection from 45.148.10.92 port 51674 on 78.46.60.16 port 22
auth.log:Feb 15 04:18:59 omfg sshd[21946]: Received disconnect from 45.148.10.92 port 51674:11: Normal Shutdown, Thank you for playing [preauth]
auth.log:Feb 15 04:18:59 omfg sshd[21946]: Disconnected from 45.148.10.92 port 51674 [preauth]
auth.log:Feb 15 04:19:27 omfg sshd[22014]: Connection from 45.148.10.92 port 35522 on 78.46.60.16 port 22
auth.log:Feb 15 04:19:28 omfg sshd[22014]: Received disconnect from 45.148.10.92 port 35522:11: Normal Shutdown, Thank you for playing [preauth]
auth.log:Feb 15 04:19:28 omfg sshd[22014]: Disconnected from 45.148.10.92 port 35522 [preauth]
auth.log:Feb 15 04:19:56 omfg sshd[22153]: Con........
------------------------------
2020-02-16 19:21:23
181.57.218.210 attackbots
Portscan or hack attempt detected by psad/fwsnort
2020-02-16 19:16:26
5.165.87.211 attack
unauthorized connection attempt
2020-02-16 19:22:16
176.115.151.53 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 19:14:42
118.233.40.166 attackspam
unauthorized connection attempt
2020-02-16 19:15:07

Recently Reported IPs

35.165.238.165 7.183.70.168 9.47.120.69 101.147.232.45
155.233.196.49 9.102.80.201 220.42.15.149 55.198.172.205
184.50.150.139 195.87.209.50 170.68.216.113 73.30.175.18
85.58.194.77 240.118.30.47 70.173.87.188 26.146.42.232
190.73.26.28 246.94.153.110 164.244.208.86 23.4.137.148